Engineering Sciences/NOLTA-Information Theory(Date:2013/07/11)

Presentation
表紙

,  

[Date]2013/7/11
[Paper #]
目次

,  

[Date]2013/7/11
[Paper #]
A Study on a PIN Authentication based on Digit Addition for Preventing Shoulder-Surfing

Naoaki ISOGAI,  Madoka HASEGAWA,  Kazuma SHINODA,  Shigeo KATO,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.1,Vol.2013-SPT-6 No.1
Study of CAPTCHA Suitable for Smartphones

Mayumi TAKAYA,  Yusuke Tsuruta,  Hikari KATO,  Takeshi KOMATSUBARA,  Yusuke WATANABE,  Akihiro YAMAMURA,  

[Date]2013/7/11
[Paper #]ISEC2013-11,SITE2013-6,ICSS2013-16,EMM2013-13
Proposal of the Support System at the Time of Introduction of User Applications in Android OS

Yuuki KOMATU,  Eiitirou KODAMA,  Jiahong WANG,  Toyoo TAKATA,  

[Date]2013/7/11
[Paper #]ISEC2013-12,SITE2013-7,ICSS2013-17,EMM2013-14
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform

Naoki YOSHIDA,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2013/7/11
[Paper #]ISEC2013-13,SITE2013-8,ICSS2013-18,EMM2013-15
Examination of IDS Log Analysis Using Discrete Wavelet Transform

Satoshi KIMURA,  Hiroyuki INABA,  

[Date]2013/7/11
[Paper #]ISEC2013-14,SITE2013-9,ICSS2013-19,EMM2013-16
Engineering Ethics Education with world cafe discussion

Michio NAKANISHI,  

[Date]2013/7/11
[Paper #]ISEC2013-15,SITE2013-10,ICSS2013-20,EMM2013-17
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools

Takahiro HAGA,  Takushi OTANI,  

[Date]2013/7/11
[Paper #]ISEC2013-16,SITE2013-11,ICSS2013-21,EMM2013-18
The Concept of "Group Privacy" in the Information Age : Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group?

Takushi Otani,  

[Date]2013/7/11
[Paper #]ISEC2013-17,SITE2013-12,ICSS2013-22,EMM2013-19
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability

Takanori MACHIDA,  Toshiki NAKASONE,  Kazuo SAKIYAMA,  

[Date]2013/7/11
[Paper #]ISEC2013-18,SITE2013-13,ICSS2013-23,EMM2013-20
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

Jiageng CHEN,  Shoichi HIROSE,  Hidenori KUWAKADO,  Atsuko MIYAJI,  

[Date]2013/7/11
[Paper #]ISEC2013-19,SITE2013-14,ICSS2013-24,EMM2013-21
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform

Naoki SHIBAYAMA,  Yasutaka IGARASHI,  Toshinobu KANEKO,  

[Date]2013/7/11
[Paper #]ISEC2013-20,SITE2013-15,ICSS2013-25,EMM2013-22
On the Standardization of Information Security : ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April, 2003

Atsuko MIYAJI,  Takeshi CHIKAZAWA,  Toshio TATSUTA,  Hajime WATANABE,  Shin'ichiro MATSUO,  Kenji OHKUMA,  

[Date]2013/7/11
[Paper #]ISEC2005-30,SITE2005-28
格子の最短ベクトル問題における探索空間の特定(セキュリティ,一般)

,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.13,Vol.2013-SPT-6 No.13
Security Evaluation of an Order-specified ID-based Aggeregate Signature Scheme

TOMOYA IWASAKI,  MASAKI INAMURA,  KEIICHI IWAMURA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.14,Vol.2013-SPT-6 No.14
非対称秘密分散法を用いたアプリケーションの検討(セキュリティ,一般)

,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.15,Vol.2013-SPT-6 No.15
An exclusive-OR operations based (2,2^m)-threshold secret sharing scheme using m-dimensional vector spaces over Z_2 instead of circulant permutation matrices

YUJI SUGA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.16,Vol.2013-SPT-6 No.16
Comparative evaluation of large scale sensor network for key management

RYO KANEKO,  KEIICHI IWAMURA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.17,Vol.2013-SPT-6 No.17
ライブラリの置き換えによるVM外部への安全なログ転送方式の評価(セキュリティ,一般)

,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.18,Vol.2013-SPT-6 No.18
1234>> 1-20hit(69hit)